Getting into IT Flashcards

Networking

1
Q

Software that presents itself as a printer, but does something else rather than just print the documents, such as saving it to the given file type.

A

Virtual Printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a memory management technique where secondary memory can be used as if it were a part of the main memory. a common technique used in a computer’s operating system (OS).

A

Virtual Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any computing device connected to a network.

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They use special software capable of sending videos fast enough that you can
watch it without waiting

A

Massive Database Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One of the computers on the
network has a printer connected
via a USB port. Basically, A printer that receives requests by other computers and prints jobs.

A

Printer Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a software program that sends and receives email.
Often, it is used as a blanket term for both mail transfer agents
(MTA) and mail delivery agents (MDA), each of which perform a
slightly different function.

A

Mail Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

used to organize and structure information or data. They provide a standardized format for storing and retrieving data, making it easier for software applications to process and manipulate that data.

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to digital data

A

Cylic Redundancy Check (CRC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a computer hardware component that connects a computer to a computer network. Early network interface controllers were commonly implemented on expansion cards that plugged into a computer bus. Wikipedia

A

A network interface controller (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a binary number, meaning it’s a string of ones and zeros. Each one or zero is called a bit.
▪ A 12-digit hexadecimal number assigned to each device connected to the network.
▪ address is 48 big log, providing 281 trillion addresses, so there are plenty of addresses to go around.

A

Media(Medium) Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A system for connecting a number of computer systems to a form a Local Area Network (LAN), with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. 3 types: 10BASE-T (commonly use), 100BASE-T, 1000BASE-T

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you attached each system to
this box via cables to special ports.
The box take care of all the tedious
details required by the network to
get a frames sent to the correct
systems.

A

Star Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a group of computers
located physically close to each
other no more than a few
hundred meters apart most.

A

Local Area Network
(LAN):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

▪ Is the heart of the basic star.
This room is where all the
horizontal runs from all the
work areas come together.

A

Telecommunications Room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The central component of every
telecommunications room is one or
more equipment racks. Provides a safe, stable platform for all the different hardware components.

A

Equipment Rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

32-bit numbers that are typically displayed in dotted decimal notation. A 32-bit address contains two primary parts: the network prefix and the host number. All hosts within a single network share the same network address. Each host also has an address that uniquely identifies it. (172.16.254.1)

A

Internet Protocol version 4
(IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

128 bits in length and consists of eight, 16-bit fields, with each field bounded by a colon. Each field must contain a hexadecimal number, in contrast to
the dotted-decimal notation of IPv4
addresses. (2001:0db8:0000:0000:0000:8a2e:0370:7334)

A

Internet Protocol version 6
(IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an IP address that is assigned by an enterprise organization to an internal host. These IP addresses are used in private networks, which are not available, or reachable, from the Internet.
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255

A

RFC1918 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a large network of information that is not tied to a single location. It can facilitate communication, the sharing of information and much more between devices from around the world through a it’s provider.

A

Wide Area Network (WAN)

20
Q

A unique numerical identifier for every
device or network that connects to the
internet. Typically assigned by an
internet service provider we used this
for communicating across the
internet.

A

Internet Protocol (IP)

21
Q

one of the main protocols of the Internet protocol suite. It lies between the Application and Network Layers which are used in providing reliable delivery services. It is a connection-oriented protocol for communications that helps in the exchange of messages between different devices over a network

A

Transmission Control Protocol (TCP)

22
Q

A networked device configured to use Auto IP first makes a request to a server for an address. If the device does not receive an IP address, which happens when there is no server on the network or when the DHCP server is not responding, the device assigns itself an address.

A

Dynamic Host Configuration Protocol (DHCP)

23
Q

Help network clients find a website
using human-readable hostnates
instead of numeric IP addresses. It converts names and numbers,
and number to names.

the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.

A

Domain Name System (DNS)

24
Q

Domain Name under top-level provider

A

Fully-Qualified Domain Name (FQDN)

25
Q

refers to the amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router. TTL is also used in other contexts including CDN caching and DNS caching.

When a packet of information is created and sent out across the Internet, there is a risk that it will continue to pass from router to router indefinitely. To mitigate this possibility, packets are designed with an expiration called …. or hop limit. Packet it can also be useful in determining how long a packet has been in circulation, and allow the sender to receive information about a packet’s path through the Internet.

A

Time To Live (TTL)

26
Q

Internet security service that allows users to access the Internet as though they were connected to a private network. This encrypts Internet communications as well as providing a strong degree of anonymity. Some of the most common reasons people use VPNs are to protect against snooping on public WiFi, to circumvent Internet censorship, or to connect to a business’s internal network for the purpose of remote work.

Types: Client to site, site to site, clientless.

A

Virtual private network (VPN)

27
Q

a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

A

Transmission Control Protocol/Internet Protocol/Internet Protocol (TCP/IP)

28
Q

is the method for sending data from one device to another across the internet. Every device has an IP address that uniquely identifies it and enables it to communicate with and exchange data with other devices connected to the internet. Today, it’s considered the standard for fast and secure communication directly between mobile devices.

A

Internet Protocol (IP)

29
Q

describes seven layers that computer systems use to communicate over a network. The model has 7 layers.

which enables diverse
communication systems to communicate
using standard protocols.

A

Open Systems Interconnection(OSI)

30
Q

connect different networks together, such
as your local network to the internet.

A

Router

31
Q

Switches operate within a local area network (LAN) to connect
devices together.

A

Switch

32
Q

devices provide centralized
storage accessible over a network.

A

Network Attached Storage (NAS)

33
Q

distribute network traffic across multiple servers or resources to ensure efficient utilization and high availability.

A

Load Balancer

34
Q

servers act as intermediaries between clients and servers, improving security, performance, and content filtering.

A

Proxy Server

35
Q

provide communication between
networks with different protocols, such as
translating between IP and non-IP networks.

A

Gateway

36
Q

enable wireless devices to connect to a wired network (Wi-Fi networks).

A

Access Point (AP)

37
Q

facilitate secure remote access to a
corporate network via virtual private networks (VPNs).

A

VPN Concentrator

38
Q

physical and logical arrangement of nodes and connections in a network. Nodes
usually include devices such as
switches, routers and software with
switch and router features, often represented as a graph: Star, Point to Point, Bus, Ring, Tree, Mesh, Hybrid.

A

Network Topology

39
Q

to allow multiple devices to share a single public IP address.

A

Network Address Translation (NAT)

40
Q

Ethernet cabling system is designed to run at 10 Mbps on twisted pair cabling.

A

10BaseT

41
Q

a type of network topology where each device (or node) is connected to exactly two other devices, forming a closed loop. Data travels in one direction around the ring until it reaches its destination. Ring topologies are less common in modern networks, but they have been used in the
past.

A

Ring

42
Q

a network configuration in which every
device on the network is connected to a
central hub or switch. All data traffic in a star topology flows through the central hub, which acts as a mediator to manage data transmissions between devices.

A

Star

43
Q

A port at the software level is identified for each transport protocol and address combination by the port number assigned to it.
In computer networking, a port or port number is a number assigned to uniquely identify a connection endpoint and to direct data to a specific service. Ex. Port 80: http - which is for websites.

A

Port

44
Q

a protocol for secure remote access and file transfer over a network. It uses public-key cryptography to authenticate clients and servers, and encrypts data channels.

A

The Secure Shell Protocol ( SSH)

45
Q
A